Sciweavers

2056 search results - page 352 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
ICSE
2009
IEEE-ACM
13 years 5 months ago
Architecture-driven self-adaptation and self-management in robotics systems
We describe an architecture-centric design and implementation approach for building self-adapting and selfmanaging robotics systems. The basis of our approach is the concept of me...
George Edwards, Joshua Garcia, Hossein Tajalli, Da...
CCR
2011
13 years 2 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
ISPASS
2008
IEEE
14 years 2 months ago
Explaining the Impact of Network Transport Protocols on SIP Proxy Performance
This paper characterizes the impact that the use of UDP versus TCP has on the performance and scalability of the OpenSER SIP proxy server. The Session Initiation Protocol (SIP) is...
Kaushik Kumar Ram, Ian C. Fedeli, Alan L. Cox, Sco...
PPPJ
2004
ACM
14 years 1 months ago
A dynamic compiler for embedded Java virtual machines
A new acceleration technology for Java embedded virtual machines is presented in this paper. Based on the selective dynamic compilation technique, this technology addresses the J2...
Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, ...
CISIS
2010
IEEE
14 years 1 months ago
Bringing Introspection Into the BlobSeer Data-Management System Using the MonALISA Distributed Monitoring Framework
Abstract—Introspection is the prerequisite of an autonomic behavior, the first step towards a performance improvement and a resource-usage optimization for largescale distribute...
Alexandra Carpen-Amarie, Jing Cai, Alexandru Costa...